Virtual machine migration method, switch, and virtual machine system
a virtual machine and switch technology, applied in the field of communication technologies, can solve the problems of affecting the timeliness of services, the switch cannot accurately acquire the migration of the vm from the vdp message, etc., and achieve the effect of accurate acquisition
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
embodiment 1
[0032]A first embodiment of the present invention provides a virtual machine migration method, and the procedure of the method is shown in FIG. 3, including:
[0033]Step 101: Receive a message sent by a server, where the message is used to enable a switch to discover a connected virtual machine interface; and obtain, from the message, an identifier for indicating whether a virtual machine is migrated.
[0034]Step 102: Determine, according to the identifier indicating whether the virtual machine is migrated, whether the virtual machine is a virtual machine that is migrated to the server.
[0035]In the embodiment of the present invention, it may be determined whether an added virtual machine on a server is a newly created one or a migrated one by receiving a message sent by the server and according to an identifier field in the message. In this way, compared with the prior art, it may be accurately acquired whether a virtual machine is migrated to the server.
embodiment 2
[0036]A second embodiment of the present invention provides a virtual machine migration method, which is improved based on the first embodiment. Furthermore, when a switch acquires that a virtual machine is migrated to a server, services corresponding to the virtual machine bound to ports of the switch may be further migrated. The following uses migration in the DHCP (Dynamic Host Configuration Protocol) snooping technology as an example to further describe the embodiment of the present invention.
[0037]DHCP snooping is a security feature of the DHCP protocol. Untrustworthy DHCP information is filtered by creating and maintaining a DHCP snooping user binding table. The DHCP snooping user binding table includes parameters such as a MAC address, an IP address, lease time, and a VLAN-ID interface of the user in an untrustworthy zone. After DHCP snooping is enabled on an existing switch, the switch snoops DHCP messages, and may extract and record parameters, such as an IP address and a M...
embodiment 3
[0064]A third embodiment of the present invention provides a switch, and the structure of the switch is shown in FIG. 7, including:
[0065]a receiving module 1, configured to receive a message sent by a server, where the message is used to enable the switch to discover a connected virtual machine interface; and
[0066]a first obtaining module 2, configured to obtain, from the message, an identifier for indicating whether a virtual machine is migrated, and determine, according to the identifier indicating whether the virtual machine is migrated, whether the virtual machine is a virtual machine that is migrated to the server.
[0067]In the embodiment of the present invention, it may be determined whether an added virtual machine on a server is a newly created one or a migrated one by receiving a message sent by the server and according to an identifier field in the message. In this way, compared with the prior art, it may be accurately acquired whether a virtual machine is migrated to the s...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


